E Commerce

Download as pdf or txt
Download as pdf or txt
You are on page 1of 48

1. What is the Web Browser?

Web Browser Definition: A software application used to access information on the World
Wide Web is called a Web Browser. When a user requests some information, the web
browser fetches the data from a web server and then displays the webpage on the user’s
screen.

2. Define URL.

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the
Internet. It is also referred to as a web address. URLs consist of multiple parts -- including
a protocol and domain name -- that tell a web browser how and where to retrieve a
resource.
End users use URLs by typing them directly into the address bar of a browser or by
clicking a hyperlink found on a webpage, bookmark list, in an email or from another
application.

3. What is private key?

Private key encryption is often used to encrypt data stored or transmitted between two
parties. For example, when you log in to a website using a username and password, the
password is often encrypted using a private key before it is transmitted to the web
server.

4. Define encryption?

Encryption is the process by which a readable message is converted to an unreadable


form to prevent unauthorized parties from reading it. Decryption is the process of
converting an encrypted message back to its original (readable) format. The original
message is called the plaintext message.

5. What do you mean by wireless application protocol?


Wireless Application Protocol (WAP) is a specification for a set of communication
protocols to standardize the way wireless devices, such as mobile phones and radio
transceivers, can be used for internet access, including email, the web, newsgroups and
instant messaging.

6. What do you mean by firewall?

A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of
security rules.
Firewalls can be used for controlling and blocking access to certain websites and online
services to prevent unauthorized use. For example, an organization can use a firewall to
block access to objectionable websites to ensure employees comply with company
policies when browsing the internet.

7. What is E-Cash?

The term "eCash" is something of an umbrella term. Electronic cash represents a way
of paying for something without using physical currency. Basically, users would
convert the money in their bank account to eCash. You can then use these funds to
make electronic payments or execute a peer-to-peer transaction when sharing money
between friends
Ecash was conceived by David Chaum as an anonymous cryptographic electronic
money or electronic cash system in 1982. It was realized through his
corporation Digicash and used as micropayment system at one US bank from 1995 to
1998.

8. What do you mean by E-mail?

Electronic mail, commonly shortened to “email,” is a communication method that uses


electronic devices to deliver messages across computer networks. "Email" refers to both
the delivery system and individual messages that are sent and received.
Email has existed in some form since the 1970s, when programmer Ray Tomlinson
created a way to transmit messages between computer systems on the Advanced
Research Projects Agency Network (ARPANET). Modern forms of email became available
for widespread public use with the development of email client software (e.g. Outlook)
and web browsers, the latter of which enables users to send and receive messages over
the Internet using web-based email clients (e.g. Gmail).

9. Write down the advantages of E-commerce.

1. Faster buying process


2. Store and product listing creation
3. Cost reduction
4. Affordable advertising and marketing
5. Flexibility for customers
6. No reach limitations
7. Product and price comparison
8. Faster response to buyer/market demands
9. Several payment modes
10. Enables easy exports

10. What is the purpose of Image map? Explain.


Image maps provide a method to map areas of images to actions. For example, a
company Web site might want to provide a map of the United States that allows
customers to click on a state to find a local office or store.
There are two types of image maps: client-side and server-side. Client-side image maps
rely on the user agent to process the image, the area where the user clicks, and the
expected action. Server-side image maps rely on the user agent only to tell the server
where the user clicked; an agent on the Web server does all the processing.
Between the two methods, client-side image maps are preferred. The user agent is able
to offer immediate feedback to the user (like being over a clickable area). Most user
agents support client-side image maps. Server-side agents can also bog down a server if
the map draws consistent traffic, hides many details necessary to provide immediate
feedback to the user, and might not be compatible with some user agents.
If you want images to be clickable and take the user to one particular destination, you
don't have to use an image map. Instead, embed the <img> tags in appropriate anchor
tags (<a>) similarly to the following:
<a href="catpage.html">
<img alt="Go to the cat page"
src="cat.jpg"></a>

11. What is the purpose of authentication?

Authentication is a term that refers to the process of proving that some fact or some
document is genuine. In computer science, this term is typically associated with proving
a user’s identity. Usually, a user proves their identity by providing their credentials, that
is, an agreed piece of information shared between the user and the system.
Authentication with Username and Password
Username and password combination is the most popular authentication mechanism,
and it is also known as password authentication.
A well-known example is accessing a user account on a website or a service provider
such as Facebook or Gmail. Before you can access your account, you must prove you own
the correct login credentials. Services typically present a screen that asks for a username
along with a password. Then, they compare the data inserted by the user with the values
previously stored in an internal repository.

12. What Is Digital Signature, Write down the steps in digital signature verification?

A signature is known to signify an agreement. If you sign something, it means you are
giving your consent to it. When talking about the use of a signature in a bank while
signing checkbooks, it again shows our consent. But these signatures can also turn into
havoc when duplicated. This can be a little scary as such duplicate signatures have the
capability of robbing you of your hard-earned money. But one way you can prevent this
scam of duplicate signatures is by using Digital Signature.

To verify the
digital signature, the recipient performs the following steps as shown in Figure 7.6.
Step 1 : Decrypt the digital signature with the sender’s public key (keYpublic,sender)
* Step 2: Find the message digest of the file, i.e., Hms[F].
* Step 3: Compare the two message digests as found in steps 1 and 2. If the content
to get the message digest, i.e., DR~[Adi gitalsignature I keypublic,senderl.
of the file has not been changed, HMD~[Fsh]o uld be equal to
DR~[Adi gitalsignature I keypublic,sender].

13. Write down the benefits of wireless application protocol to e-commerce

o WAP is a very fast-paced technology.


o It is an open-source technology and completely free of cost.
o It can be implemented on multiple platforms.
o It is independent of network standards.
o It provides higher controlling options.
o It is implemented near to Internet model.
o By using WAP, you can send/receive real-time data.
o Nowadays, most modern mobile phones and devices support WAP.
Disadvantages

o The connection speed in WAP is slow, and there is limited availability also.
o In some areas, the ability to connect to the Internet is very sparse, and in some
other areas, Internet access is entirely unavailable.
o It is less secured.
o WAP provides a small User interface (UI).
Applications of Wireless Application Protocol (WAP)
The following are some most used applications of Wireless Application Protocol or WAP:
o WAP facilitates you to access the Internet from your mobile devices.
o You can play games on mobile devices over wireless devices.
o It facilitates you to access E-mails over the mobile Internet.
o Mobile hand-sets can be used to access timesheets and fill expenses claims.
o Online mobile banking is very popular nowadays.
o It can also be used in multiple Internet-based services such as geographical
location, Weather forecasting, Flight information, Movie & cinema information,
Traffic updates etc. All are possible due to WAP technology.

14. Write down the various features of XML.

XML Features
 Excellent for handling data with a complex structure or atypical data.
 Data described using markup language.
 Text data description.
 Human- and computer-friendly format.
 Handles data in a tree structure having one-and only one-root element.
 Excellent for long-term data storage and data reusability.

15. What is the purpose of lockbox?

The publisher needs to open a special account known as a lockbox with its bank with this
special account, the publisher’s bank can accept e-checks for the publisher. This is
particularly useful for large organizations that need to handle a large number of checks.
Having received an e-check by the publisher’s bank, all other steps follow those of a
deposit-and-clear scenario.
A lockbox is a bank-operated mailing address to which a company directs its customers
to send their payments. The bank opens the incoming mail, deposits all received funds in
the company's bank account, and scans the payments and any remittance information.

16. Write short note on E-education

E-education or e-learning is the delivery of education or any type of training by


electronic teaching methods. This electronic method can be a computer or a smartphone
where teaching material is accessed by use of the internet usually. Other than the
internet, CDs, DVDs, television and other similar tools can also be used for E-learning.
There are several E-learning portals offering online courses in India and abroad now.
Many people avail these professional certificate courses to enhance their learning and
career.
E-learning can be achieved anywhere. A student does not need to be physically present
in a class and the teachers do not need to reach to a place on a scheduled time to deliver
a lecture. A person can study from the comforts of his home through E-learning. You can
also access it while travelling. In this way, it is good for professionals who can’t leave
their job but still want to study. This is a type of distance learning that is highly functional
because of its accessibility and flexibility.

Another benefit of E-learning lies in its flexibility of timing. You can enrol yourself in a
course and then you are free to access it any time you can as long as you finish the entire
course within a stipulated time range. Some courses are in fact free from any time limit.
You can take those up at your own pace. Thus, E-learning can be ‘on-demand’ as well.
You can demand where you want to study and at what time you want it.

17. How will you create a table in HTML? Write down the different tags and
attributes to create a table.
A table is a representation of data arranged in rows and columns. Really, it's more like a
spreadsheet. In HTML, with the help of tables, you can arrange data like images, text,
links and so on into rows and columns of cells.
The use of tables in the web has become more popular recently because of the amazing
HTML table tags that make it easier to create and design them.
To create a table in HTML you will need to use tags. The most important one is
the <table> tag which is the main container of the table. It shows where the table will
begin and where it ends.

Common HTML Table tags

Other tags include:

 <tr> - represents rows


 <td> - used to create data cells
 <th> - used to add table headings
 <caption> - used to insert captions
 <thead> - adds a separate header to the table
 <tbody> - shows the main body of the table
 <tfoot> - creates a separate footer for the table

18. Discuss the basic structure of HTML document in short.

As we all know HTML is a language of the web. It’s used to design the web pages or we
can say structure the page layouts of a website. HTML stands for HYPERTEXT MARKUP
LANGUAGE, as its full form suggests it’s not any programming language, a markup
language. So, while the execution of HTML code we can’t face any such error. In real
HTML code wasn’t compiled or interpreted because HTML code was rendered by the
browser. which is similar to the compilation of a program. HTML content is parched
through the browser to display the content of HTML.
Html used predefined tags and attributes to tell the browser how to display content,
means in which format, style, font size, and images to display. Html is a case insensitive
language. Case insensitive means there is no difference in upper case and lower case (
capital and small letters) both treated as the same, for r example ‘D’ and ‘d’ both are
the same here.
There are generally two types of tags in HTML:
1. Paired Tags: These tags come in pairs. That is they have both opening(< >) and
closing(</ >) tags.
2. Empty Tags: These tags do not require to be closed.

Structure of an HTML Document


An HTML Document is mainly divided into two parts:
 HEAD: This contains the information about the HTML document. For Example, the
Title of the page, version of HTML, Meta Data, etc.
 BODY: This contains everything you want to display on the Web Page.

19. Discuss the four different categories of EE-commerce in detail.

The Types
The following are the different types of e-commerce platforms:
1. Business-to-Business
Business (B2B)
2. Business-to-Consumer
Consumer (B2C)
3. Consumer-to-Consumer (C2C)
4. Consumer-to-Business (C2B)
5. Business-to-Administration (B2A)
6. Consumer-to-Administration (C2A)
Business-to-Business (B2B)
A B2B model of business involves the conduct of trade between two or more
businesses/companies. The channels of such trade generally include conventional
wholesalers and producers who are dealing with retailers.
Business-to-Consumer (B2C)
Business-to-Consumer model of business deals with the retail aspects of e-commerce,
i.e. the sale of goods and/or services to the end consumer through digital means. The
facility, which has taken the business world by storm, enables the consumer to have a
detailed look at their proposed procurements before placing an order. After the
placement of such orders, the company/agent receiving the order will then deliver the
same to the consumer in a convenient time-span. Some of the businesses operating in
this channel include well-known players like Amazon, Flipkart, etc.
This mode of purchase has proved to be beneficial to the consumers when compared to
the traditional method, as they are endowed with access to helpful contents which may
guide their purchases appropriately.
Consumer-to-Consumer (C2C)
This business model is leveraged by a consumer for selling used goods and/or services to
other consumers through the digital medium. The transactions here are pursued
through a platform provided by a third party, the likes of which include OLX, Quickr, etc.

Consumer-to-Business (C2B)
A C2B model is the exact reversal of a B2C model. While the latter is serviced to the
consumer by a business, the C2B model provides the end consumers with an
opportunity to sell their products/services to companies. The method is popular in
crowdsourcing based projects, the nature of which typically includes logo designing, sale
of royalty-free photographs/media/design elements, and so on and so forth.
Note – the term ‘crowdsourcing’ was coined in the year 2005 as a sourcing model that
facilities individuals/organizations to obtain goods/services from internet users.
Business-to-Administration (B2A)
This model enables online dealings between companies and public administration, i.e.
the Government by enabling the exchange of information through central websites. It
provides businesses with a platform to bid on government opportunities such as
auctions, tenders, application submission, etc. The scope of this model is now enhanced,
thanks to the investments made towards e-government.
Consumer-to-Administration (C2A)
The C2A platform is meant for consumers, who may use it for requesting information or
posting feedbacks concerning public sectors directly to the government
authorities/administration. Its areas of applicability include:
 The dissemination of information.
 Distance learning.
 Remittance of statutory payments.
 Filing of tax returns.
 Seeking appointments, information about illnesses, payment of health services,
etc.

20. Write short note on hybrid encryption.

Hybrid encryption is an approach to encoding and decoding data that blends the speed
and convenience of a public asymmetric encryption scheme with the effectiveness of a
private symmetric encryption scheme.
In this approach to cryptography, the sender generates a private key, encrypts the key
by using a public key algorithm and then encrypts the entire message (including the
already-encrypted private key) with the original symmetric key. The encoded cipher can
only be decoded if the recipient knows the private key the sender originally generated.
If Bob wants to send an encypted message to Alice in a hybrid cryptosystem, for
example, he might do the following:
 Request Alice’s public key.
 Generate a new symmetric (private) key and use it to encrypt a message.
 Use Alice’s public key to encrypt the new symmetric (private) key and the message.
 Send the entire cipher to Alice.
Alice will then be able to use her own private key to decrypt the sender’s private key and
decode the rest of the message.
Security researchers are looking at ways hybrid encryption can be used as an alternative
in quantum computing to more traditional encryption schemes. Until standards have
been put in place, however, a hybrid approach can be accompanied by an increased risk
of implementation flaws that can negate the encryption scheme’s usefulness.

21. Write a brief overview of relational database with an example.


A relational database is a type of database that stores and provides access to data points
that are related to one another. Relational databases are based on the relational model,
an intuitive, straightforward way of representing data in tables. In a relational database,
each row in the table is a record with a unique ID called the key. The columns of the
table hold attributes of the data, and each record usually has a value for each attribute,
making it easy to establish the relationships among data points.

A relational database is a type of database that focuses on the relation between stored
data elements. It allows users to establish links between different sets of data within the
database and use these links to manage and reference related data.
Many relational databases use SQL (Structured Query Language) to perform queries and
maintain data.
Relational database systems use a model that organizes data into tables of rows (also
called records or tuples) and columns (also called attributes or fields). Generally,
columns represent categories of data, while rows represent individual instances.
Let's use a digital storefront as an example. Our database might have a table containing
customer information, with columns representing customer names or addresses, while
each row contains data for one individual customer.
These tables can be linked or related using keys. Each row in a table is identified using a
unique key, called a primary key. This primary key can be added to another table,
becoming a foreign key. The primary/foreign key relationship forms the basis of the way
relational databases work.
Returning to our example, if we have a table representing product orders, one of the
columns might contain customer information. Here, we can import a primary key that
links to a row with the information for a specific customer.

This way, we can reference the data or duplicate data from the customer information
table. It also means that these two tables are now related.

22. Discuss all the basic SQL statements with their syntax and example.

When you want to do some operations on the data in the database, then you must have
to write the query in the predefined syntax of SQL.
The syntax of the structured query language is a unique set of rules and guidelines,
which is not case-sensitive. Its Syntax is defined and maintained by the ISO and ANSI
standards.
Following are some most important points about the SQL syntax which are to
remember:

o You can write the keywords of SQL in both uppercase and lowercase, but writing
the SQL keywords in uppercase improves the readability of the SQL query.
o SQL statements or syntax are dependent on text lines. We can place a single SQL
statement on one or multiple text lines.
o You can perform most of the action in a database with SQL statements.
o SQL syntax depends on relational algebra and tuple relational calculus.

SQL Statement

SQL statements tell the database what operation you want to perform on the structured
data and what information you would like to access from the database.
The statements of SQL are very simple and easy to use and understand. They are like
plain English but with a particular syntax.
Simple Example of SQL statement:

1. SELECT "column_name" FROM "table_name";

Each SQL statement begins with any of the SQL keywords and ends with the semicolon
(;). The semicolon is used in the SQL for separating the multiple Sql statements which
are going to execute in the same call. In this SQL tutorial, we will use the semicolon (;) at
the end of each SQL query or statement.

Most Important SQL Commands and Statements

1. Select Statement
2. Update Statement
3. Delete Statement
4. Create Table Statement
5. Alter Table Statement
6. Drop Table Statement
7. Create Database Statement
8. Drop Database Statement
9. Insert Into Statement
10. Truncate Table Statement
11. Describe Statement
12. Distinct Clause
13. Commit Statement
14. Rollback Statement
15. Create Index Statement
16. Drop Index Statement
17. Use Statement

Let's discuss each statement in short one by one with syntax and one example:

1. SELECT Statement

This SQL statement reads the data from the SQL database and shows it as the output to
the database user.
Syntax of SELECT Statement:

SELECT column_name1, column_name2, .…, column_nameN


[ FROM table_name ]
[ WHERE condition ]
[ ORDER BY order_column_name1 [ ASC | DESC ], .... ];

Example of SELECT Statement:

SELECT Emp_ID, First_Name, Last_Name, Salary, City


FROM Employee_details
WHERE Salary = 100000
ORDER BY Last_Name

This example shows the Emp_ID, First_Name, Last_Name, Salary, and City of those
employees from the Employee_details table whose Salary is 100000. The output shows
all the specified details according to the ascending alphabetical order of Last_Name.
3. UPDATE Statement

This SQL statement changes or modifies the stored data in the SQL database.
Syntax of UPDATE Statement:

UPDATE table_name
SET column_name1 = new_value_1, column_name2 = new_value_2, ...., column_na
meN = new_value_N
[ WHERE CONDITION ];

Example of UPDATE Statement:

UPDATE Employee_details
SET Salary = 100000
WHERE Emp_ID = 10;

This example changes the Salary of those employees of the Employee_details table
whose Emp_ID is 10 in the table.

3. DELETE Statement

This SQL statement deletes the stored data from the SQL database.

Syntax of DELETE Statement:


1. DELETE FROM table_name
2. [ WHERE CONDITION ];
Example of DELETE Statement:
DELETE FROM Employee_details
WHERE First_Name = 'Sumit';
This example deletes the record of those employees from the Employee_details table
whose First_Name is Sumit in the table.

4. CREATE TABLE Statement

This SQL statement creates the new table in the SQL database.
Syntax of CREATE TABLE Statement:

CREATE TABLE table_name


(
column_name1 data_type [column1 constraint(s)],
column_name2 data_type [column2 constraint(s)],
.....
.....,
column_nameN data_type [columnN constraint(s)],
PRIMARY KEY(one or more col)
);

Example of CREATE TABLE Statement:

CREATE TABLE Employee_details(


Emp_Id NUMBER(4) NOT NULL,
First_name VARCHAR(30),
Last_name VARCHAR(30),
Salary Money,
City VARCHAR(30),
PRIMARY KEY (Emp_Id)
);

This example creates the table Employee_details with five columns or fields in the SQL
database. The fields in the table are Emp_Id, First_Name, Last_Name, Salary, and City.
The Emp_Id column in the table acts as a primary key, which means that the Emp_Id
column cannot contain duplicate values and null values.

5. ALTER TABLE Statement

This SQL statement adds, deletes, and modifies the columns of the table in the SQL
database.
Syntax of ALTER TABLE Statement:
1. ALTER TABLE table_name ADD column_name datatype[(size)];

The above SQL alter statement adds the column with its datatype in the existing
database table.

1. ALTER TABLE table_name MODIFY column_name column_datatype[(size)];

The above 'SQL alter statement' renames the old column name to the new column name
of the existing database table.

1. ALTER TABLE table_name DROP COLUMN column_name;

Example of ALTER TABLE Statement:

ALTER TABLE Employee_details


ADD Designation VARCHAR(18);

This example adds the new field whose name is Designation with size 18 in
the Employee_details table of the SQL database.

6. DROP TABLE Statement

This SQL statement deletes or removes the table and the structure, views, permissions,
and triggers associated with that table.
Syntax of DROP TABLE Statement:

DROP TABLE [ IF EXISTS ]


table_name1, table_name2, ……, table_nameN;

The above syntax of the drop statement deletes specified tables completely if they exist
in the database.
Example of DROP TABLE Statement:

DROP TABLE Employee_details;


This example drops the Employee_details table if it exists in the SQL database. This
removes the complete information if available in the table.

7. CREATE DATABASE Statement

This SQL statement creates the new database in the database management system.
Syntax of CREATE DATABASE Statement:

CREATE DATABASE database_name;

Example of CREATE DATABASE Statement:

CREATE DATABASE Company;

The above example creates the company database in the system.

8. DROP DATABASE Statement

This SQL statement deletes the existing database with all the data tables and views from
the database management system.
Syntax of DROP DATABASE Statement:

1. DROP DATABASE database_name;

Example of DROP DATABASE Statement:

1. DROP DATABASE Company;

The above example deletes the company database from the system.

9. INSERT INTO Statement

This SQL statement inserts the data or records in the existing table of the SQL database.
This statement can easily insert single and multiple records in a single query statement.
Syntax of insert a single record:

1. INSERT INTO table_name


2. (
3. column_name1,
4. column_name2, .…,
5. column_nameN
6. )
7. VALUES
8. (value_1,
9. value_2, ..…,
10. value_N
11. );

Example of insert a single record:

1. INSERT INTO Employee_details


2. (
3. Emp_ID,
4. First_name,
5. Last_name,
6. Salary,
7. City
8. )
9. VALUES
10. (101,
11. Akhil,
12. Sharma,
13. 40000,
14. Bangalore
15. );

This example inserts 101 in the first column, Akhil in the second column, Sharma in the
third column, 40000 in the fourth column, and Bangalore in the last column of the
table Employee_details.
Syntax of inserting a multiple records in a single query:
INSERT INTO table_name
( column_name1, column_name2, .…, column_nameN)
VALUES (value_1, value_2, ..…, value_N), (value_1, value_2, ..…, value_N),….;

Example of inserting multiple records in a single query:

INSERT INTO Employee_details


( Emp_ID, First_name, Last_name, Salary, City )
VALUES (101, Amit, Gupta, 50000, Mumbai), (101, John, Aggarwal, 45000, Calcutta), (101, Si
dhu, Arora, 55000, Mumbai);

This example inserts the records of three employees in the Employee_details table in
the single query statement.

10. TRUNCATE TABLE Statement

This SQL statement deletes all the stored records from the table of the SQL database.
Syntax of TRUNCATE TABLE Statement:

TRUNCATE TABLE table_name;

Example of TRUNCATE TABLE Statement:

TRUNCATE TABLE Employee_details;

This example deletes the record of all employees from the Employee_details table of the
database.

11. DESCRIBE Statement

This SQL statement tells something about the specified table or view in the query.
Syntax of DESCRIBE Statement:

DESCRIBE table_name | view_name;

Example of DESCRIBE Statement:


DESCRIBE Employee_details;

This example explains the structure and other details about the Employee_details table.

12. DISTINCT Clause

This SQL statement shows the distinct values from the specified columns of the database
table. This statement is used with the SELECT keyword.

ADVERTISEMENT

Syntax of DISTINCT Clause:

1. SELECT DISTINCT column_name1, column_name2, ...


2. FROM table_name;

Example of DISTINCT Clause:

SELECT DISTINCT City, Salary


FROM Employee_details;

This example shows the distinct values of the City and Salary column from
the Employee_details table.

13. COMMIT Statement

This SQL statement saves the changes permanently, which are done in the transaction of
the SQL database.
Syntax of COMMIT Statement:

COMMIT

Example of COMMIT Statement:

DELETE FROM Employee_details


WHERE salary = 30000;
COMMIT;
This example deletes the records of those employees whose Salary is 30000 and then
saves the changes permanently in the database.

14. ROLLBACK Statement


This SQL statement undo the transactions and operations which are not yet saved to the
SQL database.
Syntax of ROLLBACK Statement:

ROLLBACK

Example of ROLLBACK Statement:

DELETE FROM Employee_details


WHERE City = Mumbai;
ROLLBACK;

This example deletes the records of those employees whose City is Mumbai and then
undo the changes in the database.

15. CREATE INDEX Statement

This SQL statement creates the new index in the SQL database table.
Syntax of CREATE INDEX Statement:

CREATE INDEX index_name


ON table_name ( column_name1, column_name2, …, column_nameN );

Example of CREATE INDEX Statement:

CREATE INDEX idx_First_Name


ON employee_details (First_Name);

This example creates an index idx_First_Name on the First_Name column of


the Employee_details table.
16. DROP INDEX Statement

This SQL statement deletes the existing index of the SQL database table.
Syntax of DROP INDEX Statement:

DROP INDEX index_name;

Example of DROP INDEX Statement:

DROP INDEX idx_First_Name;

This example deletes the index idx_First_Name from the SQL database.

17. USE Statement

This SQL statement selects the existing SQL database. Before performing the operations
on the database table, you have to select the database from the multiple existing
databases.
Syntax of USE Statement:

USE database_name;

Example of USE DATABASE Statement:

USE Company;
This example uses the company database.

23. Write short note on Web mining.


Data Mining- World Wide Web

Over the last few years, the World Wide Web has become a significant source of
information and simultaneously a popular platform for business. Web mining can define
as the method of utilizing data mining techniques and algorithms to extract useful
information directly from the web, such as Web documents and services, hyperlinks,
Web content, and server logs. The World Wide Web contains a large amount of data
that provides a rich source to data mining. The objective of Web mining is to look for
patterns in Web data by collecting and examining data in order to gain insights.

What is Web Mining?

Web mining can widely be seen as the application of adapted data mining techniques to
the web, whereas data mining is defined as the application of the algorithm to discover
patterns on mostly structured data embedded into a knowledge discovery process. Web
mining has a distinctive property to provide a set of various data types. The web has
multiple aspects that yield different approaches for the mining process, such as web
pages consist of text, web pages are linked via hyperlinks, and user activity can be
monitored via web server logs. These three features lead to the differentiation between
the three areas are web content mining, web structure mining, web usage mining.
There are three types of data mining:

1. Web Content Mining:


Web content mining can be used to extract useful data, information, knowledge from
the web page content. In web content mining, each web page is considered as an
individual document. The individual can take advantage of the semi-structured nature of
web pages, as HTML provides information that concerns not only the layout but also
logical structure. The primary task of content mining is data extraction, where structured
data is extracted from unstructured websites. The objective is to facilitate data
aggregation over various web sites by using the extracted structured data. Web content
mining can be utilized to distinguish topics on the web. For Example, if any user searches
for a specific task on the search engine, then the user will get a list of suggestions.
2. Web Structured Mining:
The web structure mining can be used to find the link structure of hyperlink. It is used to
identify that data either link the web pages or direct link network. In Web Structure
Mining, an individual considers the web as a directed graph, with the web pages being
the vertices that are associated with hyperlinks. The most important application in this
regard is the Google search engine, which estimates the ranking of its outcomes
primarily with the PageRank algorithm. It characterizes a page to be exceptionally
relevant when frequently connected by other highly related pages. Structure and
content mining methodologies are usually combined. For example, web structured
mining can be beneficial to organizations to regulate the network between two
commercial sites.
3. Web Usage Mining:
Web usage mining is used to extract useful data, information, knowledge from the
weblog records, and assists in recognizing the user access patterns for web pages. In
Mining, the usage of web resources, the individual is thinking about records of requests
of visitors of a website, that are often collected as web server logs. While the content
and structure of the collection of web pages follow the intentions of the authors of the
pages, the individual requests demonstrate how the consumers see these pages. Web
usage mining may disclose relationships that were not proposed by the creator of the
pages.

24. Write a note on XML document.

XML as a markup language characterizes a set of rules for encoding scripts (documents)
in an arrangement that is both comprehensible and machine-decipherable. Thus, a
developer would love to ask know, what precisely is a markup language? Markup is data
added to a script that upgrades its significance in so many ways, it distinguishes,
however, the components and how they identify with one another. Particularly, a
markup language is a bunch of emblems that can be put in the content of a script to
differentiate and name the pieces of that script.
Consider the following example of XML markup when put together in a bit of text:
1 <message>
2 <text>Hello, world!</text>
3 </message>
This piece incorporates the markup emblem, or the labels, for example,
<message>…</message> also, <text>… </text>. The labels (tags) <message> and
</message> mark the beginning and the end of the XML code section. The labels (tags)
<text> and </text> encompass the content Hello, world!.
The process of the invention of XML started around the 1990s with the sole aim of
integrating the definition of new text elements. XML Working Group (Initially known as
the SGML Editorial Review Board) created XML in the year 1996. The group was led by
Jon Bosak of Sun Microsystems with the dynamic cooperation of an XML Special Interest
Group (recently known as the SGML Working Group) likewise sorted out by the W3C.
Don Connolly who filled in as the Working Group’s contact was among the team as a
contact with the World Wide Web Consortium (W3W).
Extensible markup language (XML) is a script (document) formatting language consumed
by a few websites. The extensibility of XML makes it imperative, however, extremely
useful language. More precisely, XML is a disentangled type of standard generalized
markup language (SGML) expected to target scripts that are circulated on the Internet.
Similar to SGML, XML utilizes document type definitions (DTDs) for characterization of
documents and also the implications of tags utilized in them. XML gives a larger number
of sorts of hypertext joins than HTML, for example, bidirectional connections and
connections comparative with a script subsection. Furthermore, the ability of XML to
adopt conventions allows it fully interpret and decipher text elements. For example,
script elements are set by start and end tags, <BEGIN>… </BEGIN>.
The plan objectives for XML are:
 XML will be direct-usable over the Web.
 XML will uphold a broad assortment of uses.
 XML will be viable with SGML.
 It will be anything but difficult to compose programs which measure XML scripts
(documents).
 The quantity of alternative highlights in XML is meant to be indisputably the
base, preferably zero.
 The XML documents ought to be human-intelligible and sensibly clear.
 The XML configuration ought to be arranged rapidly.
 XML document shall be any means be straightforward and simple to create.
By far, XML is immensely significant. Dr. Charles Goldfarb who was individually engaged
during its innovation said, “the sacred goal of computing, tackling the issue of general
data trade between unique frameworks.” It is likewise a helpful organization for virtually
all things ranging from circumscribing files to data and scripts of practically any sort. XML
is a user-friendly language and automatically produced that you would not need to be
very much familiar with everything commands/specifications so as to execute programs
or technically benefit from it. What makes a difference is to comprehend the main logic
behind XML and what it does, and consequently, you can perceive how to manoeuvre it
in your own activities.
History of XML
Here are some significant XML historical milestones:
 SGML was also the source of XML.
 In February 1998, XML version 1.0 was released.
 IETF Proposed Standard: XML Media Types, January 2001
 The Extensible Markup Language (XML) is an acronym for Extensible Markup
Language.
 GML was invented in 1970 by Charles Goldfarb, Ed Mosher, and Ray Lorie.
 Sun Microsystems pioneered the invention of XML in 1996.
Features of XML
 It represents an extensible markup language.
 It was invented to be naturally engaging.
 There are no predefined XML tags. You must define your personalized tags.
 XML was created to transport data, not to display that data.
 The mark-up code of XML is simple for a human to understand.
 The structured format, on the other hand, is simple to read and write from
programmes.
 XML, like HTML, is an extensible markup language.
HTML and XML
 XML is extensible, while HTML is not.
 Both XML and HTML are markup languages.
 XML was invented to backlog and convey data, while HTML is meant for
publishing and visualizing data.
 HTML tags are more defined than XML tags.
Advantages of XML/ Disadvantages of XML
Here are some key advantages of utilizing XML:
 Documents can now be moved between systems and applications. We can
swiftly communicate data between platforms with the help of XML.
 XML decouples data from HTML.
 The platform switching procedure is speeded up with the help of XML.
 User-defined tags / Customised tags can be created.
Here are some disadvantages of utilizing XML:
 The use of a processing application is necessary for XML
 The XML syntax is quite similar to other ‘text-based’ data transfer protocols,
which might be perplexing at times.
 There is no intrinsic data type support.
 The XML syntax is superfluous.
XML Tree
Elements trees are used to create XML documents.
An XML tree begins with a root element and branches to child elements.
All elements can have child elements (sub-elements):
<root>
<child>
<subchild>…..</subchild>
</child>
</root>
To describe the relationships between elements, the terms parent, child, and sibling are
utilized.
Parents have kids. Parents exist for children. Siblings are children who are on the same
grade level (brothers and sisters).
Text content (Harry Potter) and attributes (category=”cooking”) are allowed for all
elements.
XML Syntax
The syntax rules of XML are exceptionally basic and cogent. The standards are anything
but straightforward to learn and simple to utilize. Under this part, we are going to simply
explore the basic syntax rule for writing an uncomplicated XML document.
The question is: are you ready? Consider the following example of making a complete
XML document
<?xml version = "1.0"?>
<contact-info>
<name>Anil Kumar</name>
<company>GreatLearning</company>
<phone>(91) 987-3679</phone>
</contact-info>

25. Discuss different types of firewall in detail.


In general, there are three types of firewall: packet filtering router, application
gateway, and circuit level gateway.

The packet filtering router:


The packet filtering router operates at the network layer. It filters packets according
to predefined filtering rules typically based on source/destination IP address and
sourceldestination port number on the packets. For example, a packet filtering
router may be configured to allow inbound packets to access the public web server
only. In this case, the packet filtering router will examine the destination IP address
of all incoming packets and admit only those packets that are destined for the web
server to enter the intranet. This prevents inbound packets being able to access
other computers in the intranet.

Application gateway/proxy server


In contrast to packet filtering routers, application gateways operate at the application layer.
Acting as a proxy server, access control is performed at the application layer rather than the
network layer. In order to use a particular application, the corresponding proxy service must
be installed in the application gateway. A user first connects to the application gateway. The
application gateway then accesses the required service on behalf of the user. For example, a
user first accesses the application gateway through the corresponding proxy service. After
successful authentication, the application gateway connects to the remote computer and
transfers the application data accordingly. Hence, the connection between the sender and
the receiver is broken into two connections: the connection between the host and the
application gateway and the connection between the application gateway and the destined
host.
Circuit level gateway
In a similar manner to application gateways, circuit level gateways also serve as an “agent”
between the sender and the receiver. Conceptually, it works like a “telephone connection.”
A user needs to make a connection before data can be transferred. Hence, special client
software may be required. After establishing a connection, packets are transferred between
the internet and the intranet over the connection. A well-known example is the SOCKS
protocol version . In this case, a client makes a TCP connection to port 1080 of the SOCKS
server. After successful authentication, the requested connection is available for
transferring data. SOCKS version 5 supports a wide range of authentication mechanisms
(e.g. IPSec), key management protocols (e.g. SKIP), and encryption methods (e.g. DES)

26. Write short note on E-banking.

Electronic banking has many names like e banking, virtual banking, online banking, or
internet banking. It is simply the use of electronic and telecommunications network for
delivering various banking products and services. Through e-banking, a customer can
access his account and conduct many transactions using his computer or mobile phone.

 Mobile/Internet Banking

Regardless of whether you use your bank’s webpage or mobile application to make a
transfer, you are using internet banking.
Internet banking enables users to make seamless transfers, access personal details,
make easy bill payments and so much more just with a stable internet connection!
If you do all these things on your bank application on your phone, it is called mobile
banking.

 ATMs

Do you have to withdraw or deposit cash urgently? Automatic Teller Machines (ATM)
allow you to do so seamlessly in just seconds. ATMs were the first form of digital
banking that was introduced.
Enter your card/account details, enter the amount to be withdrawn, enter your ATM PIN
and there you go!

 Credit/Debit Card:
You’re at a mall, buying clothes, and it’s time to pay. You swipe your card and ping! The
transaction is successful!
Before debit cards, this transaction would have involved exchanging cash, calculating
balance, and counting coins – tedious, and long.
The introduction of debit cards has allowed for transactions to be completed in mere
seconds.
Credit Cards allow users to borrow funds up to a pre-approved amount and in addition
to this, you can avail of a range of offers.

 Electronic Data Interchange (EDI)

Electronic Data Interchange is a digital mode of fund transfer across businesses.


EDI is a standard electronic format that tends to replace company paperwork like
purchase orders and invoices hence reducing manual processing errors.
In this way, it helps reduce transaction costs across a supply chain.

 Electronic Fund Transfer (EFT)

Electronic Fund Transfer is a digital way of transferring funds.


While you transact online, there are a number of modes of payment you can opt for.
National Electronics Fund Transfer (NEFT), Immediate Payment Service (IMPS) and Real-
Time Gross Settlement (RTGS).

 Electronic Clearing System (ECS)

ECS is a provision that allows a customer’s credit card bill to simultaneously be deducted
from that customer’s savings account. This allows the customer to avoid late payments.

27. Explain SET network architecture with suitable diagram.

SET PROTOCOL:
Secure Electronic Transaction (SET) protocol, secure credit card payment was usually
carried out over an SSL connection. While SSL can ensure the secure transmission of
credit card information over the internet, it is not a complete credit card payment
method. For example, it cannot support on-line credit
card authorization. SET is specially developed to provide secure credit card payment
over the internet. It is now widely supported by major credit card companies including
Visa and Mastercard.
In general, SET aims at satisfying the following security requirements in the context of
credit card payment:
 Confidentiality - Sensitive messages are encrypted so that they are kept
 Integrity - Nearly all messages are digitally signed to ensure content integrity.
 Authentication - Authentication is performed through a public key infrastructure.

SET network architecture


It has the following components
 Merchant: This refers to a seller, which is connected to an acquirer.
 Cardholder: This refers to a registered holder of the credit card who is a buyer.
 Issuer: This refers to the bank that issues the credit card to a cardholder.
 Acquirer: This refers to the bank that serves as an “agent” to link a merchant to
multiple issuers. By doing so, a merchant can process various credit cards
through a single acquirer. Each acquirer has a payment gateway through which it
can process authorization and other necessary transactions for the merchants.
 Payment gateway: This is typically connected to the acquirer. The payment
gateway is situated between the SET system and the financial network of the
current credit card system for processing the credit card payment.

In general, the SET protocol addresses interactions among these network components.
More specifically, the SET protocol addresses communications between a cardholder and a
merchant and between a merchant and a payment gateway. Communications between an
acquirer and an issuer are handled by reusing the financial network in the current credit
card system.

28. Explain about internet advertising techniques and strategies in detail.


On the internet, advertising techniques and strategies are often interwoven and so it is
appropriate to deal with them together. It is useful to separate the techniques into mass
marketing and targeted marketing strategies. Mass marketing techniques include the
following:
1. E-mail
2. Banners
Apart from providing marketing services, some companies specialize in measuring and
analyzing performance of internet marketing campaigns such as Jupiter Media Metrix.

E-mail
E-mail is becoming increasingly widely used as a means of distributing advertising messages
to people on the internet. Here, the marketing strategies, to be reasonably successful,
require appropriate market segmentation and the development or purchase of suitable e-
mail lists, E-mail advertising is increasingly being tied to the use of promotions and
gimmicks. The advantages of e-mail advertising are that it is
cheap to implement, can include the facility for feedback and return messages, and will
allow one to progressively tailor the e-mail advertisements based on this. The downsides of
this include the fact that internet users frequently read only messages from people they
know and treat the rest as junk mail. In addition, the sending of unsolicited mail
indiscriminately leads to spamming. Currently, legislation is progressively being put into
place to provide better control of this. Some advertisers put in an interaction allowing one
to deregister from receiving any mail containing advertising in the e-mail message itself,
probably to convey the fact that they are making an effort to avoid a charge of spamming.
However, progressively the effectiveness of e-mail in the future may be affected by the
number of messages received by an internet user, and as this is growing very rapidly, it is
likely to reduce its effectiveness
if indiscriminately used.

Banners
Banners represent another widely used technique for advertising. A banner is a small display
on the web consisting of text, graphics, and animations, which either appear randomly
when you surf the internet (random banners) or when a particular keyword is typed in
during a search using a search engine (keyword banners) These banners are normally linked
to the web site of the advertiser, where further information can be obtained. If the user
clicks on the banner, he is transferred to that web site. This leads to the concept of click
through rates (the proportion of times that the banners are clicked when viewed), which is
sometimes used as a (somewhat limited) measure of effectiveness. There is conflicting
evidence on the effectiveness of banners.

29.Write down the different attributes used with <IMG> tag


The <IMG> tag in HTML is used to display an image on a webpage. Some of the common
attributes used with the <IMG> tag are:

1. src: specifies the URL of the image file


2. alt: provides alternative text for the image, which is displayed if the image cannot be
loaded
3. width: specifies the width of the image in pixels
4. height: specifies the height of the image in pixels
5. title: provides a title or tooltip for the image
6. align: specifies the alignment of the image within the surrounding text
7. border: specifies the border size

30.What is private key ?


A private key is a cryptographic variable that is used in conjunction with an algorithm to
encrypt and decrypt data. Private keys should be shared only with the key's generator or
parties authorized to decrypt the data.
31.What do you mean by digital certificate?
A digital certificate is an identification document. Tt functions like your passport or any
other identity card a digital certificate consists of the owner’s information (I) and the
owner’s public key (K). The content is signed digitally by a trusted party called the
certification authority (CA).

32. What is IPSec protocol?


IPSec (Internet Protocol Security) is a protocol suite used for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet in a data stream. It
provides security services such as confidentiality, data integrity, and authentication for
network communications.
IPSec operates at the network layer of the OSI model and can be used to secure
communications between networks, between a remote user and a network, or between
individual devices within a network.

33.Draw a well labelled diagram of the MAGICS framework.


34.What do you mean by E-broker?
Brokers that provide a registration service with directory, search facilities, e-payment
facilities, and security-related facilities. Any business can register with such an e-broker.
brokers provide comparison shopping, order taking and fulfilment, and services to a
customer. That is the reason why they are sometimes referred to as electronic
intermediaries

35.What do you mean by web publishing?


Web publishing is the process of publishing original content on the Internet. The process
includes building and uploading websites, updating the associated web pages, and posting
content to these web pages online. Web publishing comprises of personal, business, and
community websites in addition to e-books and blogs.

36.What is Consumer-to-Consumer (C2C) E-Commerce?


Consumer-to-consumer (C2C) This refers to situations where both the seller and the buyer
are consumers. With the advent of e-commerce, on-line auctions provide an effective means
for supporting C2C e-commerce. For example, our VBS can provide on-line auction services
for customers to sell used books to other customers through the VBS web site. In addition, a
virtual community can be formed.

37.What do you mean by ASP? Draw the well labelled diagram of ASP
model.
To develop interactive web applications, Microsoft introduced a server-side programming
tool called Active Server Page (ASP), ASP is a "scripting" technique that runs on web servers
rather than web clients. This contrasts with VBScript and JavaScript, which run on web
clients. It basically generates dynamic HTML documents for the web client. Execution of the
ASP code by the server returns the corresponding HTML document to the client. The server-
side code written in ASP can be embedded in the HTML document, which allows one to
insert it into web pages even though it is executed on the server.
38.How will you compile and execute servelets? Explain in short.
To compile and execute servlets, you will need a Java development kit (JDK) installed on
your computer. You can use a Java IDE like Eclipse or IntelliJ IDEA to write and compile your
servlet code.

To compile a servlet, you will need to create a Java class that extends HttpServlet and
override the doGet() or doPost() method. Once you have written your servlet code, you can
compile it using the javac command in the command line or within your IDE.

To execute a servlet, you will need to deploy it to a servlet container like Apache Tomcat.
You can package your servlet code into a .war file and deploy it to the servlet container.
Once deployed, you can access your servlet by navigating to its URL in a web browser.

39.What do you mean by mobile electronic business?


Currently, most e-commerce applications can be accessed only via a fixed terminal. It is
expected that the current WEB (Web-based Electronic Business) will evolve to become the
MEB (Mobile Electronic Business) At the moment, the enabling technology for realizing the
MEB is the Wireless Application,
Mobile e-commerce (m-commerce) is a term that describes online sales transactions that
use wireless electronic devices such as hand-held computers, mobile phones or laptops.
These wireless devices interact with computer networks that have the ability to conduct
online merchandise purchases.

40.Write a short note on E-education.


E-education, also known as online education or electronic education, refers to the use of
electronic technologies and digital resources to deliver educational content and facilitate
learning outside of a traditional classroom setting. This can include online courses, virtual
classrooms, interactive multimedia content, and other digital tools to support learning.

E-education has become increasingly popular in recent years, particularly due to


advancements in technology and the widespread availability of the internet. It offers
flexibility and convenience for learners, allowing them to access educational materials and
participate in courses from anywhere with an internet connection.

Some benefits of e-education include:

1. Flexibility: Students can access course materials and lectures at their own pace and
on their own schedule.
2. Accessibility: E-education allows students to learn from anywhere, breaking down
geographical barriers.
3. Cost-effectiveness: Online courses can often be more affordable than traditional in-
person classes.
4. Personalization: E-education platforms can provide personalized learning
experiences tailored to individual student needs.

41. E-Commerce in retailing.


E-commerce in retailing refers to the buying and selling of goods or services online
through websites or online platforms. This allows customers to shop from the comfort of
their own homes and provides retailers with a global reach to sell their products.
E-commerce in retailing has become increasingly popular in recent years due to the
convenience it offers to both consumers and businesses. It allows retailers to reach a
larger audience, reduce overhead costs, and provide a more personalized shopping
experience to customers.

42. Discuss the four different categories of E-Commerce in detail.


E-commerce can be categorized into four main categories based on the type of transaction
and the parties involved. These categories are:

1. Business to Consumer (B2C): This is the most common type of e-commerce, where
businesses sell products or services directly to consumers. Examples include online
retailers like Amazon, Walmart, and eBay. B2C e-commerce typically involves a one-
way transaction where the consumer pays for the product or service.

2. Business to Business (B2B): In B2B e-commerce, businesses sell products or services


to other businesses. This type of e-commerce is often used for wholesale
transactions, where large quantities of goods are bought and sold. Examples include
Alibaba and ThomasNet. B2B e-commerce usually involves negotiations, contracts,
and long-term relationships between the parties involved.

3. Consumer to Consumer (C2C): C2C e-commerce involves transactions between


individual consumers. This type of e-commerce is facilitated by online platforms that
connect buyers and sellers directly. Examples include eBay, Craigslist, and Facebook
Marketplace. C2C e-commerce can involve both new and used goods, and often
relies on user ratings and reviews to build trust between parties.

4. Consumer to Business (C2B): In C2B e-commerce, individual consumers offer


products or services to businesses. This can include freelance work, online
consulting, or selling handmade goods to companies. Examples include Upwork and
Fiverr. C2B e-commerce is less common than other types but is growing in popularity
as more individuals seek to monetize their skills and expertise.

43. Write down the advantages of three-tier model over the traditional
single-tier or two-tier model for web applications.

The three-tier model for web applications offers several advantages over the traditional
single-tier or two-tier models. Some of the key advantages include:

1. Scalability: The three-tier model allows for better scalability as each tier can be
scaled independently. This means that if one tier experiences high traffic or load, it
can be scaled up without affecting the other tiers.

2. Maintainability: With the three-tier model, each tier is separated and can be
maintained independently. This makes it easier to update or make changes to one
tier without impacting the entire application.

3. Security: By separating the presentation, logic, and data layers, the three-tier model
provides better security for web applications. This separation helps to prevent
unauthorized access to sensitive data and reduces the risk of security breaches.

4. Performance: The three-tier model can improve performance by distributing the


workload across multiple tiers. This can help to reduce latency and improve response
times for users.

44. Write a short note with syntax and example :


(a) Insert statement
(b) Update statement.
(a) Insert statement:

The INSERT statement is used to add new rows of data into a table in a database.
The syntax for an INSERT statement is as follows:

INSERT INTO table_name (column1, column2, column3, ...) VALUES (value1, value2,
value3, ...);
Example: INSERT INTO customers (first_name, last_name, email) VALUES ('John',
'Doe', '[email protected]');

(b) Update statement:

The UPDATE statement is used to modify existing rows of data in a table in a


database. The syntax for an UPDATE statement is as follows:

UPDATE table_name SET column1 = value1, column2 = value2, ... WHERE condition;

Example: UPDATE customers SET email = '[email protected]' WHERE


last_name = 'Doe';

45. Explain any two techniques to support session tracking for web-
based applications.
Session tracking is a crucial aspect of web-based applications as it allows the server to
maintain stateful information about a user's interactions with the application. There are
several techniques to support session tracking for web-based applications:

1. Cookies: Cookies are small pieces of data stored on the client's browser that can
be used to track sessions. The server can set a unique session ID in a cookie,
which is then sent back with each request to identify the user's session.

2. URL rewriting: In this technique, the server appends a unique session ID to the
URL of each page request. This session ID can then be used to track the user's
session.

3. Hidden form fields: Another technique is to include a hidden form field in each
page that contains the session ID. This session ID is then sent back to the server
with each form submission.

4. Session variables: Server-side session variables can also be used to store session
information. The server generates a unique session ID for each user and stores
relevant session data in memory or a database.

46. Explain proxy server with suitable diagram.


A proxy server acts as an intermediary between a client and a server,
forwarding requests from the client to the server and returning the
server's response to the client. It can be used for various purposes such
as improving performance, filtering content, and enhancing security.
Here is a simple diagram illustrating how a proxy server works:
Client --> Proxy Server --> Server
The client sends a request to the proxy server, which then forwards the
request to the server. The server processes the request and sends a
response back to the proxy server, which in turn sends the response to
the client.

47. Explain the role of wireless application protocol in mobile


commerce.
The explosive growth of cellular phones and the growing demand for
mobile internet services there is a compelling need for accessing the
internet through mobile devices, particularly cellular phones. As
mentioned earlier, it is expected that the current WEB will evolve to
become MEB. Currently, the key enabling technology for MEB is the
Wireless Application Protocol
As the current web technologies are primarily designed for desktop
computers working under a wired network environment, they cannot be
applied directly to mobile devices such as cellular phones and palm
computers. In fact, these devices are relatively less powerful in terms of
CPU speed, screen size, memory, input device capability, and battery
life. Moreover, there are other operational constraints in wireless
networks such as limited bandwidth and unstable operating conditions.
Hence, new solutions are required for providing internet access to these
devices.
Mid 1997 marked a major milestone of WAP when Ericsson, Motorola,
and Nokia found the WAP Forum with Unwired Planet. With the aim of
developing standards for providing internet access to handheld mobile
devices, the main goals of the WAP Forum are:
 To provide internet-based services to wireless phones and other
wireless terminals;
 To provide a global wireless protocol specification for developing
wireless applications; and
 To provide a framework for creating contents and applications
that can be applied to different wireless networks.

In order to accomplish these goals, the WAP Forum has developed the
WAP specification for mobile devices.
At the time of writing, the latest version of the WAP specification is 1.2.
It is largely based on the existing internet technologies such as HTTP,
HTML, and JavaScript. An overview of the WAP specifications is as
follows
In terms of programming, the WAP model is largely based on the existing
web programming techniques, to facilitate integration with the existing
web system. To format data on the user interface effectively, a simple
markup language called Wireless Markup Language (WML) is developed
based on. To enhance
the functionality of WML (e.g., for generating a dynamic page), a
scripting language called WMLScript is developed. In principle, it
provides functions similar to those of JavaScript. Finally, a microbrowser
specification is provided to support WML andVVMLScript, and a Wireless
Telephony Applications (WTA) framework is defined forintegrating the
microbrowser and telephone functions.

48. Write down the features of payment methods of internet payment


systems.
In general, when we evaluate a payment method, there are several features as
follows
1. Anonymity: This refers to whether the payment method is anonymous. In
other words, this is concerned with whether a third party can trace back who
was involved in the payment transaction. particular whether it is easy to
perpetrate different kinds of fraud such as a forged payment.
2. Security: This is concerned with whether the payment method is secure, in
3. Overhead cost: This refers to the overhead cost of processing a payment.
4. Transferability: This refers to whether a payment can be carried out without
the involvement of a third party such as a bank.
5. Divisibility: This refers to whether a payment can be divided into arbitrary
small
6. Acceptability: This refers to whether the payment method is supported
globally, payments whose sum is equal to the original payment. i.e., not by a
closed user group only.
These characteristics provide a basis for the evaluation of payment methods.
49. Explain the benefits of E-Retailing in detail.

E-Retailing, or electronic retailing, refers to the process of selling goods and services
online through websites or other digital platforms. There are several benefits of E-
Retailing, some of which include:

1. Global Reach: E-Retailing allows businesses to reach customers beyond their


physical location, enabling them to tap into a global market and increase their
customer base.

2. Cost-Effective: Setting up an online store is often more cost-effective than


maintaining a physical storefront. E-Retailing eliminates the need for expenses
such as rent, utilities, and staff salaries.

3. Convenience: E-Retailing provides customers with the convenience of shopping


from anywhere at any time. This flexibility can lead to increased sales and
customer satisfaction.

4. Personalization: E-Retailing allows businesses to collect data on customer


preferences and behavior, enabling them to personalize their marketing
strategies and offer targeted promotions.

5. Increased Visibility: With the rise of social media and digital marketing, E-
Retailing can help businesses increase their online visibility and attract more
customers.

6. Analytics and Insights: E-Retailing platforms provide businesses with valuable


data and analytics that can help them understand customer behavior, track sales
performance, and make informed decisions.

7. Scalability: E-Retailing allows businesses to easily scale their operations as they


grow, without the constraints of physical limitations.

50. Explain traditional retailing and E-Retailing in detail.


Traditional retailing refers to the traditional brick-and-mortar stores where customers
physically visit a store to make a purchase. This type of retailing has been around for
centuries and involves face-to-face interactions between customers and sales staff.
Traditional retailing typically involves a physical store location, inventory management,
and customer service.

On the other hand, E-Retailing, also known as electronic retailing or online retailing,
refers to the buying and selling of goods and services over the internet. E-retailing has
become increasingly popular in recent years due to the convenience and accessibility it
offers to customers. E-retailing involves online stores, digital marketing, online payment
systems, and order fulfillment.
E-retailing allows customers to shop from the comfort of their own homes, at any time
of day or night. It also allows businesses to reach a global audience and target specific
customer demographics more effectively.

51. What is web server?


A web server is a computer program that serves requested web pages to clients over the
World Wide Web. The primary function of a web server is to store, process, and deliver web
pages to users browsing the internet.

52. What is JDBC?


JDBC stands for Java Database Connectivity. It is an API (Application Programming Interface)
that allows Java programs to interact with databases. JDBC enables Java applications to
execute SQL statements, retrieve results, and update data in a database.

53. Define encryption.


Encryption is the process of converting plaintext data into ciphertext data using an algorithm
and a key. This ensures that only authorized parties can access and understand the original
data.

54. What do you mean by firewall?


A firewall is a network security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. It acts as a barrier between a trusted
network and an untrusted network, such as the internet, to prevent unauthorized access
and protect against cyber threats.

55. What is E-check?


An e-check, or electronic check, is a digital version of a traditional paper check. It allows for
the transfer of funds directly from one bank account to another through an electronic
transaction. E-checks are commonly used for online payments or transactions.

56. Write a note on Digital Phenomenon.


Digital phenomenon refers to the various ways in which digital technology has impacted
society, culture, and communication. This includes the rise of social media, online shopping,
digital art, virtual reality, and many other aspects of our daily lives that have been
transformed by digital technology.

Some key points about digital phenomenon include:

1. The rapid pace of technological advancement has led to an increase in digital literacy
and the need for new skills in order to navigate the digital landscape effectively.

2. Digital phenomenon has also raised concerns about privacy, security, and the ethical
use of technology, as well as the impact of digital media on mental health and well-
being.

3. The digital phenomenon has also created new opportunities for creativity,
collaboration, and innovation, as well as new ways of connecting with others and
sharing information.

57. Write a short note on Java servlet architecture.


Java Servlets - an effective programming technology that extends the functionality of Java to
the server-side. Java was originally introduced by Sun Microsystems Inc. with the aim of
enhancing interactivity in the web, particularly on the client side. To accomplish this, Sun
developed a small client-side application called Applet ( “ App” means applications and “let”
means small). Although applets can enhance client-side interactiviey, this is done at the
expense of long downloading time; hence, they are not attractive for
most e-commerce applications.

A servlet is a server-side Java program running inside a Java Virtual Machine (JVM). Through
the servlet engine, it can interact with the server and also the HTTP. Like other CGI
applications, a servlet is invoked by a client from the client browser (e.g. via an HTML form).
It may also be invoked by other servlets or Java programs. As mentioned earlier, unlike
traditional CGI applications, which need to set up multiple processes for handling multiple
requests, a servlet can handle multiple requests under different threads. Therefore, servlets
provide a solution that is more saleable. Furthermore, servlets can interact closely with the
server to do things that may be performed easily with the traditional CGI programming
techniques.

To run servlets, there are basically two alternatives. The first one is to use a servlet enabled
web server, i.e., a web server that can support the servlet APIs directly. The second solution
is to use a “plug-in servlet engine in a non servlet-enabled web server.
58. Write a short note on JDBC API.

JDBC (Java Database Connectivity) API is a Java API that allows Java programs to interact
with databases. It provides a set of classes and interfaces for connecting to databases,
executing SQL queries, and retrieving results.

Some key features of JDBC API include:

1. Connection management: JDBC provides classes for establishing and managing


database connections.

2. Statement execution: JDBC allows you to create and execute SQL statements such as
SELECT, INSERT, UPDATE, and DELETE.

3. Result set handling: JDBC provides classes for retrieving and processing the results
returned by SQL queries.

4. Transaction management: JDBC supports transaction management, allowing you to


control and manage database transactions.

Overall, JDBC API is essential for Java developers who need to work with databases in their
applications.

59. What is an authentication header service?


An authentication header service is a mechanism used in computer networks to verify the
identity of a user or a system before granting access to resources. It typically involves the
exchange of credentials (such as a username and password) between the client and the
server, which are then used to generate a secure token or header that is sent with each
request for authentication.

One commonly used authentication header service is the HTTP Authentication header,
which allows a web server to request authentication information from a client and verify it
before allowing access to a protected resource.

60. What do you mean by Mobile Electronic Business?


Mobile electronic business web refers to the use of mobile devices, such as smartphones
and tablets, to conduct electronic commerce transactions. This includes buying and selling
goods and services, accessing online stores, making payments, and managing business
operations through mobile applications and websites.

Here are some links that provide more information on mobile electronic business web:

1. Mobile E-Commerce: Trends, Statistics, and Best Practices - This article provides an
overview of the current trends and statistics in mobile e-commerce, as well as best
practices for businesses to optimize their mobile commerce strategy.

2. Mobile Commerce Guide - This guide offers insights into the latest technologies and
strategies for building successful mobile commerce websites and applications.
3. Mobile Commerce: The Ultimate Guide - This comprehensive guide covers
everything you need to know about mobile commerce, including its benefits,
challenges, and best practices.

61. What do you mean by cookies?


Cookies are small files of information that a web server generates and sends to a web
browser. Web browsers store the cookies they receive for a predetermined period of time,
or for the length of a user's session on a website. They attach the relevant cookies to any
future requests the user makes of the web server.

62. What is public key?


In cryptography, a public key is a large numerical value that is used to encrypt data. The key
can be generated by a software program, but more often, it is provided by a trusted,
designated authority and made available to everyone through a publicly accessible
repository or directory.

63. What do you mean by mobile agents?


Mobile agents are mobile software programs that can move across the internet for
performing specific tasks autonomously. Due to their flexibility and mobile function, they
can complement the existing client server-based system to provide more advanced e-
commerce services (e.g. product searching). Currently, most e-commerce applications can
be accessed only via a fixed terminal.

You might also like